mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
64 lines
3.1 KiB
JSON
64 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2024-28142",
|
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
|
"published": "2024-12-12T13:15:09.763",
|
|
"lastModified": "2024-12-12T16:15:14.840",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The \"File Name\" page (/cgi/uset.cgi?-cfilename) in the User Settings menu improperly filters the \"file name\" and wildcard character input field. By exploiting the wildcard character feature, attackers are able to store arbitrary Javascript code which is being triggered if the page is viewed afterwards, e.g. by higher privileged users such as admins.\n\n\n\n\n\n\n\n\n\nThis attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the \"Default\" User can be changed."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Debido a la falta de desinfecci\u00f3n de entrada, un atacante puede realizar ataques cross-site-scripting y ejecutar c\u00f3digo Javascript arbitrario en el navegador de otros usuarios. La p\u00e1gina \"Nombre de archivo\" (/cgi/uset.cgi?-cfilename) en el men\u00fa Configuraci\u00f3n de usuario filtra incorrectamente el campo de entrada de \"nombre de archivo\" y el car\u00e1cter comod\u00edn. Al explotar la funci\u00f3n de car\u00e1cter comod\u00edn, los atacantes pueden almacenar c\u00f3digo Javascript arbitrario que se activa si la p\u00e1gina se ve posteriormente, por ejemplo, por usuarios con privilegios superiores, como los administradores. Este ataque puede incluso realizarse sin iniciar sesi\u00f3n porque las funciones afectadas no est\u00e1n completamente protegidas. Sin iniciar sesi\u00f3n, solo se puede cambiar el par\u00e1metro de nombre de archivo del usuario \"Predeterminado\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
|
"baseScore": 4.7,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://r.sec-consult.com/imageaccess",
|
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
|
},
|
|
{
|
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
|
}
|
|
]
|
|
} |